Sciweavers

2863 search results - page 340 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
106
Voted
USENIX
2007
15 years 6 months ago
Supporting Practical Content-Addressable Caching with CZIP Compression
Content-based naming (CBN) enables content sharing across similar files by breaking files into positionindependent chunks and naming these chunks using hashes of their contents....
KyoungSoo Park, Sunghwan Ihm, Mic Bowman, Vivek S....
INFOCOM
2009
IEEE
15 years 10 months ago
Fair Routing in Delay Tolerant Networks
—The typical state-of-the-art routing algorithms for delay tolerant networks are based on best next hop hill-climbing heuristics in order to achieve throughput and efficiency. T...
Josep M. Pujol, Alberto Lopez Toledo, Pablo Rodrig...
ICVS
2009
Springer
15 years 10 months ago
Saliency-Based Obstacle Detection and Ground-Plane Estimation for Off-Road Vehicles
Abstract. Due to stringing time constraints, saliency models are becoming popular tools for building situated robotic systems requiring, for instance, object recognition and vision...
Pedro Santana, Magno Guedes, Luís Correia, ...
147
Voted
IWNAS
2008
IEEE
15 years 10 months ago
Optimal Implementation of Continuous Data Protection (CDP) in Linux Kernel
To protect data and recover data in case of failures, Linux operating system has built-in MD device that implements RAID architectures. Such device can recover data in case of sin...
Xu Li, Changsheng Xie, Qing Yang
118
Voted
IEEEARES
2007
IEEE
15 years 10 months ago
Security vulnerabilities in DNS and DNSSEC
We present an analysis of security vulnerabilities in the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS data that is provided by name servers lacks suppor...
Suranjith Ariyapperuma, Chris J. Mitchell